Colin Mc Hugo

0 %
Colin Mc Hugo
Security Engineer Manager & CEO at Quantum Infinite Solutions Group Ltd.
  • Residence:
  • County:
  • Country:
Cyber Security Incident Response
Management & Architecture of Cyber Security Teams
Solutions & Coaching
  • Cyber Security Incident Response
  • Management & Architecture of Cyber Security Teams
  • Solutions
  • Training & Coaching

Data Wiper Malware Disguised As Ransomware Targets Israeli Entities

May 26, 2021

Researchers on Tuesday disclosed a brand new espionage marketing campaign that resorts to harmful data-wiping assaults concentrating on Israeli entities a minimum of since December 2020 that camouflage the malicious exercise as ransomware extortions.

Cybersecurity agency SentinelOne attributed the assaults to a nation-state actor affiliated with Iran it tracks below the moniker “Agrius.”

“An evaluation of what at first sight seemed to be a ransomware assault revealed new variants of wipers that had been deployed in a set of harmful assaults in opposition to Israeli targets,” the researchers said. “The operators behind the assaults deliberately masked their exercise as ransomware assaults, an unusual conduct for financially motivated teams.”

password auditor

The group’s modus operandi entails deploying a customized .NET malware known as Apostle that has developed to turn into totally useful ransomware, supplanting its prior wiper capabilities, whereas a few of the assaults have been carried out utilizing a second wiper named DEADWOOD (aka Detbosit) after a logic flaw in early variations of Apostle prevented information from being erased.

As well as, the Agrius actors drop a .NET implant known as IPsec Helper that can be utilized to exfiltrate information or deploy further malware. What’s extra, the risk actor’s techniques have additionally witnessed a shift from espionage to demanding ransoms from its victims to get well entry to encrypted information, solely to have them truly destroyed in a wiping assault.


In addition to utilizing ProtonVPN for anonymization, the Agrius assault cycle leverages 1-day vulnerabilities in web-based purposes, together with CVE-2018-13379, to achieve an preliminary foothold and subsequently ship ASPXSpy net shells to take care of distant entry to compromised methods and run arbitrary instructions.

If something, the analysis provides to proof that state-sponsored actors with ties to the Iranian authorities are more and more ransomware operations as a subterfuge method to imitate different financially motivated cybercriminal ransomware teams.

Not too long ago leaked paperwork by Lab Dookhtegan revealed an initiative known as “Project Signal” that linked Iran’s Islamic Revolutionary Guard Corps to a ransomware operation by way of a contracting firm.

“Whereas being disruptive and efficient, ransomware actions present deniability, permitting states to ship a message with out taking direct blame,” the researchers mentioned. “Comparable methods have been used with devastating impact by other nation-state sponsored actors.”

Posted in SecurityTags:
Write a comment